The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust...
The use of recommendation in trust-based models has its advantages in enhancing the correctness and quality of the rating provided by mobile and autonomous nodes in MANETs. However, building a trust model with a recommender system in dynamic and distributed networks is a challenging problem due to the risk of dishonest recommendations. Dealing with dishonest recommendations can result in the additional...
Mobile ad hoc Network (MANET) consists of autonomous mobile nodes without any centralized control. These mobile nodes move arbitrarily within the self-configurable MANET environment. Each of these mobile nodes can act as router while receiving and forwarding information. Secure routing is an important issue in MANET as mobile nodes are prone to attacks from malicious nodes and the overall performance...
MANET i.e. a mobile ad hoc network does not have a fixed infrastructure and is a self configuring one. So the nodes are mobile and due to this mobility the uncertainty arises. This uncertainty affects the node's behavior and also choice of other nodes for proper communication with each other. The evaluation of the uncertainty is needed so that the less uncertain nodes can be considered for participating...
The Mobile Ad-hoc Network (MANET) is a volatile network, the nodes are in the movable state. The node can easily enter and exit from the network. The attacker node can easily enter into the network and affect the performance of the network. The malicious nodes are difficult to detect as any node can enter into the network easily. The detection of the malicious node is very important to secure and...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
A Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can move abruptly in and out the network. MANET has several special specifications including, non-fixed infrastructure, the absence of a central administration, limited bandwidth, and limited energy. Merging two MANETs is a situation that can occur frequently because of mobility. Due to the nature of MANET, it is vulnerable to...
In mobile Ad hoc networks, data is transmitted in airspace between mobile entities without any centralized control. This environment offers many and very important services for mobile users. However, the level of security in this kind of network has not yet reached a significant level of maturity against the ferocious attacks. In this work, we present a new model to trust routing protocols communications...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
Fault-tolerance is one of the major issues in ad hoc networks. Failure probability is greater because of limited energy level of mobile nodes and dynamic topology constraints. Whenever a node is dubious to be attacked, checkpointing of data is done on some reliable and trustworthy node. So, evaluation of trust factor of a node is an important aspect that largely influences the recovery process. This...
Mobile ad-hoc networks allow communication between mobile nodes without the existence of an infrastructure, so they are adaptable also in hostile environments. Using the wireless communication leads to a lack of security. Due to the characteristics of mobile nodes, they have batteries as power source, so their energy is constrained. A routing protocol for MANETs has to take into account this constraint,...
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. In a distributed Mobile Ad Hoc Network (MANET), collaboration and cooperation is critical concern to managing trust. The networks work well only if the mobile nodes are trusty and behave cooperatively. Due to the openness in network topology and absence of a centralized...
Distributed nature of Mobile Adhoc NETwork (MANET) and dynamically varying topology lead to a number of security threats in MANET. Malicious behavior of the participating entity disrupts normal functioning of the network. Moreover one major problem with continuous participation of nodes in MANET is energy consumption which often leads to selfish behavior of participating entity. Here we propose a...
Mobile Ad Hoc Networks are those which could be rapidly deployed anywhere without any infrastructural facilities. The topology will be very much dynamic and the entry and exit of nodes will be unpredictable. This makes the MANET more vulnerable to attacks. Security becomes more threatening due to the insecure admission of the nodes to the network. Variety of security protocols which successfully provide...
Trust is multi-faceted, even in the same context. Nodes need to develop differentiated trust in different aspects of other nodes' behaviours. The node's needs vary with situation. Thus we have introduced a service based scheme for computation of trust which takes into consideration the security requirement of a node as criteria for choosing the appropriate trust computation scheme. It can either choose...
With the growing popularity of wireless mobile ad hoc networks(MANETs), many security concerns have arisen from MANETs especially the misbehaving nodes pose a major threat. Node misbehaviour in ad hoc network is caused by lack of cooperation and goes under the name node selfishness. A selfish node does not directly intent to damage other nodes with active attacks but it simply does not cooperate in...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
Maintaining security associations (SA) in mobile ad hoc networks (MANET) is challenging due to their intrinsically open, dynamic, and decentralized nature. Bandwidth limitations arising from both the physical characteristics of the wireless medium and the control overhead required to maintain routes in a network with changing topology add another level of difficulty to the problem. While establishing...
Routing in mobile ad-hoc networks is a challenging task. This paper proposes MPG-TAR, trust-aware routing protocol based on the formation of trusted Mobile Process groups(MPG). MPG is a collection of processes or mobile nodes present in defined vicinity where they all lie within each other's radio transmission range. The trusted MPG groups formed in MPGTAR calculate trust based on the mobility rate,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.